Tsunami: An extensible network scanning engine for detecting high severity vulnerabilities with high confidence

When an attacker begins to exploit security vulnerabilities or security misconfigurations, such as weak passwords, an organization needs to react quickly in order to protect potentially vulnerable assets. With attackers increasingly investing in automation, the time window to react to a newly released, high severity vulnerability is usually measured in hours.

Read full article on Google Open Source

 


Date:

Categorie(s):